Preferred Language
Articles
/
JBYRU4cBVTCNdQwC1UXb
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performance measures are used as a criterion to decide which classifier is the best one to detect the images with high accuracy. Eventually, the simulation results show that each classifier detect the damage/no damage image with different performance measures and then makes it easy to select the best one.

Scopus Crossref
View Publication
Publication Date
Fri May 01 2020
Journal Name
Civil Engineering Journal
Post-Fire Behavior of Post-Tensioned Segmental Concrete Beams under Monotonic Static Loading
...Show More Authors

This paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,

... Show More
Crossref (1)
Crossref
Publication Date
Fri May 01 2020
Journal Name
Civil Engineering Journal
Post-Fire Behavior of Post-Tensioned Segmental Concrete Beams under Monotonic Static Loading
...Show More Authors

This paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
On Bayesian Estimation of System Reliability in Stress – Strength Model Based on Generalized Inverse Rayleigh Distribution
...Show More Authors
Abstract<p>The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.</p>
View Publication
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Tue Sep 01 2015
Journal Name
2015 7th Computer Science And Electronic Engineering Conference (ceec)
An experimental investigation on PCA based on cosine similarity and correlation for text feature dimensionality reduction
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية/ الجزائر
The effect of using the five-finger strategy on learning movement chain on a balance beam in the artistic gymnastics of women
...Show More Authors

Abstract: The aim of the research identify the effect of using the five-finger strategy in learning a movement chain on the balance beam apparatus for students in the third stage in the College of Physical Education and Sports Science, as well as to identify which groups (experimental and controlling) are better in learning the kinematic chain on the balance beam device, has been used The experimental approach is to design the experimental and control groups with pre-and post-test. The research sample was represented by third-graders, as the third division (j) was chosen by lot to represent the experimental group, and a division Third (i) to represent the control group, after which (10) students from each division were tested by lot to repr

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Mouth Rinses on Surface Roughness of Two Methacrylate-Based and Siloraine-Based Composite Resins
...Show More Authors

Background: Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.

Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Engineering
Development of Spatial Data Infrastructure based on Free Data Integration
...Show More Authors

In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho

... Show More
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref